breakerspace / weaponizing-residual-censorship
your censor is my censor: weaponizing residual censorship to perform availability attacks
☆22Updated 3 years ago
Alternatives and similar repositories for weaponizing-residual-censorship:
Users that are interested in weaponizing-residual-censorship are comparing it to the libraries listed below
- (SP)^3: A Simple, Practical, and Safe Packet Spoofing Protocol☆12Updated 7 years ago
- censors pose a threat to the entire Internet☆132Updated 3 years ago
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆104Updated last week
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Updated 2 years ago
- ptunnel 0.72 for windows☆20Updated 10 years ago
- Open YARA scan- and search engine☆20Updated last month
- Towards Machine-Checked Analysis of Browser Security Mechanisms☆12Updated 7 months ago
- service location protocol amplified denial of service attack verification tool☆16Updated last year
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- ☆21Updated 3 years ago
- Data exfiltration using DNS☆21Updated 5 years ago
- Script fingerprinting systems based on shodan.io data☆13Updated 6 years ago
- Suricata rule and intel index☆30Updated 2 months ago
- Documentation of vmc☆14Updated 2 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆54Updated last year
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 3 years ago
- Tool for fuzzing HTTP and HTTPS requests to endpoints, and identify the rules and triggers of censorship devices.☆15Updated last year
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated 11 months ago
- A pure python tool for finding and comparing typo-squatting, bytesqatting, and homoglyph domain attacks and brand impersonation☆38Updated 4 months ago
- GQUIC Protocol Analyzer for Zeek (Bro) Network Security Monitor☆75Updated last year
- ☆26Updated this week
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated 2 years ago
- PowerShell script that abuses browser bookmark synchronization as a mechanism for sending and receiving data between systems.☆15Updated 2 years ago
- ☆42Updated 2 years ago
- Repository to track keywords & patterns lists used by crowdsec parsers and scenarios☆12Updated last week
- Library for efficient (re-)construction, transport and analysis of BGP "routing tables"☆26Updated 2 years ago
- ☆35Updated 4 years ago
- Protecting Red Team infrastructure with cyber shield blocking AWS/AZURE/IBM/Digital Ocean/TOR/AV IP/ETC. ranges☆45Updated 2 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago